CompTIA Security+ Physical Security

0.0(0)
studied byStudied by 1 person
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/61

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

What is physical security?

Measures to protect tangible assets (buildings, equipment, people) from harm or unauthorized access.

2
New cards

What are the primary purposes of fencing in physical security?

Provides a visual deterrent by defining a boundary.

Establishes a physical barrier against unauthorized entry.

Delays intruders, giving security personnel more time to react.

3
New cards

What are bollards and their purpose?

A short, robust vertical post (usually steel or concrete).

Designed to manage or redirect vehicular traffic, especially to counter vehicle-based threats.

4
New cards

How does fencing differ from bollards in terms of application?

Fences can enclose large perimeters; bollards protect specific points from vehicles.

5
New cards

Why are fencing and bollards considered primitive security tools?

They are basic physical barriers used to protect assets and people by deterring and delaying unauthorized access.

6
New cards

What is a brute force attack in physical security?

Type of attack where access to a system is gained by simply trying all of the

possibilities until you break through

7
New cards

What are four types of brute force attacks?

Forcible entry, tampering with security devices, confronting security personnel, and ramming barriers with vehicles.

8
New cards

Forcible Entry

● An act of gaining unauthorized access to a space by physically breaking or

bypassing its barriers, such as windows, doors, or fences

9
New cards

How can organizations mitigate forcible entry?

Use deadbolts, metal doors, strong door frames, and solid-core doors.

10
New cards

Tampering with security devices

● Involves manipulating security devices to create new vulnerabilities that

can be exploited

11
New cards

How can tampering with security devices be prevented?

Implement redundant systems and regular inspections.

12
New cards

Confronting security personnel

● Involves the direct confrontation or attack of your organization's security

personnel

13
New cards

How can security guards prepare for confrontations?

Through conflict resolution and self-defense training.

14
New cards

Ramming barriers with vehicles

● Uses a car, truck, or other motorized vehicle to ram into the

organization's physical security barriers, such as a fence, a gate, or even

the side of your building

15
New cards

What prevents vehicle ramming attacks?

Installing bollards or reinforced barriers.

16
New cards

What is a surveillance system?

An organized strategy or setup designed to observe and report activities in a given area

17
New cards

What are the four components of surveillance?

Video surveillance, security guards, lighting, and sensors.

18
New cards

What are key features of video surveillance?

Motion detection, night vision, facial recognition, Remote access & real-time feedback, PTZ.

19
New cards

What’s the difference between wired and wireless surveillance systems?

Wired systems use physical cables; wireless systems use Wi-Fi.

20
New cards

What does PTZ stand for?

Pan-Tilt-Zoom – it allows dynamic control of camera angle and view.

21
New cards

Where should surveillance cameras be installed?

Data centers, telecom closets, entrances, and exits.

22
New cards

Why is security guards important for surveillance?

● Flexible and adaptable forms of surveillance that organizations use

● Helps to reassure your staff or your customers that they are safe

23
New cards

Why is proper lighting important for surveillance?

Deters criminals

Reduces shadows/hiding spots

Improves video quality

24
New cards

Why is Sensors important for surveillance?

Devices that detect and respond to external stimuli or changes in the environment

25
New cards

List the 4 types of surveillance sensors.

Infrared, Pressure, Microwave, Ultrasonic.

26
New cards

Infrared Sensors

Detect changes in infrared radiation that is often emitted by warm bodies like humans or animals

27
New cards

Pressure Sensors

Activated whenever a specified minimum amount of

weight is detected on the sensor that is embedded into the

floor or a mat

28
New cards

Microwave Sensors

Detect movement in an area by emitting microwave pulses

and measuring their reflection off moving objects

29
New cards

Ultrasonic Sensors

Measures the reflection of ultrasonic waves off moving

objects

30
New cards

List 5 methods attackers use to bypass surveillance.

Visual obstruction, blinding Sensors and Cameras, acoustic interference, Electromagnetic Interference (EMI), and attacking the Physical Environment.

31
New cards

Visual Obstruction

Blocking the camera’s line of sight by:
○ spraying paint or foam onto the camera lens

○ placing asticker or tape over the lens

○ positioning objects like balloons or umbrellas in front of the

camera to block its view

32
New cards

Blinding Sensors and Cameras

Involves overwhelming the sensor or camera with a sudden burst of light to render it ineffective for a limited period of time

33
New cards

Interfering with Acoustics

● Acoustic systems are designed to listen to the environment to detect if someone is in the area or to eavesdrop on their conversations

● Jamming or playing loud music to disrupt the microphone’s functionality

34
New cards

Interfering with Electromagnetic

Involves jamming the signals that surveillance system relies on to

monitor the environment

35
New cards

What does EMI stand for?

Electromagnetic Interference

36
New cards

Attacking the Physical Environment

Exploit the environment around the surveillance equipment to

compromise their functionality

Physical tampering, like cutting wires or physically disabling devices, is an effective

strategy to bypass surveillance systems

37
New cards

What protects against surveillance bypassing?

Tamper detection, system redundancy, countermeasures, and advanced monitoring.

38
New cards

What does an access control vestibule do?

A double-door system that is designed with two doors that are electronically

controlled to ensure that only one door can be open at a given time

39
New cards

Define piggybacking.

Involves two people working together with one person who has

legitimate access intentionally allows another person who doesn't have

proper authorization to enter a secure area with them

40
New cards

Define tailgating.

Occurs whenever an unauthorized person closely follows someone through the access control vestibule who has legitimate access into the secure space without their knowledge or consent

41
New cards

What’s the difference between piggybacking and tailgating?

Piggybacking involves consent; tailgating does not.

42
New cards

What technologies do access badges use?

RFID, NFC, magnetic strips.

43
New cards

Why are security guards posted at access points?

To deter intruders, verify ID, assist, and respond to incidents.

44
New cards

Why are door locks important in physical security?

Critical physical security control measure designed to restrict and regulate access

to specific spaces or properties, preventing unauthorized intrusions and

safeguarding sensitive data and individuals

45
New cards

What are the different type of locks the a door can have?

Padlocks, Basic Door Locks, and Electronic Locks

46
New cards

Traditional Padlocks

Easily defeated and offers minimal protection

47
New cards

Basic Door Locks

Vulnerable to simple techniques like lock picking

48
New cards

Electronic Door Locks

Use advanced authentication for stronger security.

49
New cards

What are three authentication methods used in electronic door locks?

Identification numbers

Wireless signals

Biometrics

50
New cards

Identification numbers

Require entry of a unique code, providing a balance of security and convenience

51
New cards

Wireless signals

Utilize technologies like NFC, Wi-Fi, Bluetooth, or RFID for

unlocking

52
New cards

Biometrics

Rely on physical characteristics like fingerprints, retinal scans, or facial recognition for authentication

53
New cards

What are the three biometric authentication challenges?

FAR (False Acceptance), FRR (False Rejection), CER (Crossover Error Rate).

54
New cards

What is FAR?

○ Occurs when the system erroneously

authenticates an unauthorized user

○ Lower FAR by increasing scanner sensitivity

55
New cards

What is FRR?

Denies access to an authorized user.

Increasing sensitivity can increase FRR

56
New cards

What is CER?

A balance between FAR and FRR for optimal

authentication effectiveness

57
New cards

What can improve biometric security?

Using multiple factors like PIN + fingerprint or Cipher Locks.

58
New cards

What is a Cipher Locks?

■ Mechanical locks with numbered push buttons, requiring a correct combination

to open

■ Commonly used in high-security areas like server rooms

59
New cards

What is access badge cloning?

Copying RFID/NFC badge data to a new device to gain unauthorized access.

60
New cards

What are the 4 steps in access badge cloning?

Scanning the target badge.

Extracting data (e.g., RFID/NFC credentials).

Writing data to a blank card/device.

Using the clone for unauthorized access.

61
New cards

Why is badge cloning common?

■ Ease of execution

■ Ability to be stealthy when conducting the attack

■ Potentially widespread use in compromising physical security

62
New cards

How can badge cloning be prevented?

■ Implement advanced encryption in your card-based authentication systems

■ Implement Multi-Factor Authentication (MFA)

■ Regularly update your security protocols

■ Educate your users

■ Implement the use of shielded wallets or sleeves with your RFID access badges

■ Monitor and audit your access logs